- Home
- CVEs with nessus.description==This+security+upload+has+been+prepared+in+cooperation+of+the+Debian+Kernel%2C+Security+and+LTS+Teams+and+features+the+upstream+stable+release+2.6.32.64+%28see+https%3A%2F%2Flkml.org%2Flkml%2F2014%2F11%2F23%2F181+for+more+information+for+that%29.+It+fixes+the+CVEs+described+below.%0A%0ANote%3A+if+you+are+using+the+openvz+flavors%2C+please+consider+three+things%3A+a.%29+we+haven%27t+got+any+feedback+on+them+%28while+we+have+for+all+other+flavors%29+b.%29+so+do+your+test+before+deploying+them+and+c.%29+once+you+have+done+so%2C+please+give+feedback+to+debian-lts%40lists.debian.org.+%0A%0AIf+you+are+not+using+openvz+flavors%2C+please+still+consider+b%2Bc+%3A-%29%0A%0ACVE-2012-6657%0A%0AFix+the+sock_setsockopt+function+to+prevent+local+users+from+being+able+to+cause+a+denial+of+service+%28system+crash%29+attack.%0A%0ACVE-2013-0228%0A%0AFix+a+XEN+priviledge+escalation%2C+which+allowed+guest+OS+users+to+gain+guest+OS+priviledges.%0A%0ACVE-2013-7266%0A%0AFix+the+mISDN_sock_recvmsg+function+to+prevent+local+users+from+obtaining+sensitive+information+from+kernel+memory.%0A%0ACVE-2014-4157%0A%0AMIPS+platform%3A+prevent+local+users+from+bypassing+intended+PR_SET_SECCOMP+restrictions.%0A%0ACVE-2014-4508%0A%0APrevent+local+users+from+causing+a+denial+of+service+%28OOPS+and+system+crash%29+when+syscall+auditing+is+enabled+.%0A%0ACVE-2014-4653+CVE-2014-4654+CVE-2014-4655%0A%0AFix+the+ALSA+control+implementation+to+prevent+local+users+from+causing+a+denial+of+service+attack+and+from+obtaining+sensitive+information+from+kernel+memory.%0A%0ACVE-2014-4943%0A%0AFix+PPPoL2TP+feature+to+prevent+local+users+to+from+gaining+privileges.%0A%0ACVE-2014-5077%0A%0APrevent+remote+attackers+from+causing+a+denial+of+service+attack+involving+SCTP.%0A%0ACVE-2014-5471+CVE-2014-5472%0A%0AFix+the+parse_rock_ridge_inode_internal+function+to+prevent+local+users+from+causing+a+denial+of+service+attack+via+a+crafted+iso9660+images.%0A%0ACVE-2014-9090%0A%0AFix+the+do_double_fault+function+to+prevent+local+users+from+causing+a+denial+of+service+%28panic%29+attack.%0A%0ANOTE%3A+Tenable+Network+Security+has+extracted+the+preceding+description+block+directly+from+the+DLA+security+advisory.+Tenable+has+attempted+to+automatically+clean+and+format+it+as+much+as+possible+without+introducing+additional+issues
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top